Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1194043pxa; Thu, 20 Aug 2020 05:17:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzG2TsBB1OAxfoqu8lVGuQMLTCPVoDSWp1dxM24oqeulTTDsJhAZBnyXI5IHL+aZnM6BFXg X-Received: by 2002:a05:6402:22ab:: with SMTP id cx11mr2727418edb.102.1597925866251; Thu, 20 Aug 2020 05:17:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597925866; cv=none; d=google.com; s=arc-20160816; b=UUtR1UpWwwGjPZt/VfsTaY0j8w2Zv6jgb1UbPNnsuhnT6ZrgU7A/DnLMKvQDXpsCmQ 9EH+YYOjSrWW6RYA3VHW4T+dK1n3BnNUrmE8Dl0WmRVkbP9hh3fqh/pLggcNmZukUqni ZLCC/9xvc5DHkANROV64XEYs1TvWlRFvyM19WQNEdObjXQRCIDVeNvBTrZB+rDB+AKw0 6B6OFjvoaGzz+97ce5GZgoeHpQ3v65rNAVEtTIgS1aReHdj/efeDdgwYCyO1tht51nMD Cxn0tIwtiXSlFZzDwR2x/S9y2li+rMnnEktEp44yAdR2fpFtKI/ZrA2y9osgcPxpBay7 ba0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IH1n3rRkKdidGx7LEt3D8hZ+QCbybkZcDiIMJ2vM2kQ=; b=t8wEUmq+XEgS+mVZLw0Pmdndo7QffQyIZE/6ttcG7k2H5f0O0fvjy/2hiOVFTTEPIW hEnGlSsMxcMRtHOU6ud38wPW1QDz2h2Yyiu1DuXPORYU9niTB5v6IzoUYQywLuyhT/bH 1QvRrUOP5UR/nBeuENIGspOpFvPEkCgQOc5ap1sHbOxrAJQoHj+G3toXF/tG1AiPA+HK QT4lUQL67/IBIDDywfVK0Ypc92f91bgVcZCWZ6EEKcdt/wA1v10ZwxZ7vvJ6YYMg+3ry wSAGjNbe1Dx/c2tuFwjH8WKUmdS8E2x/R6T1vGR2kmaWjym4Cbz7MbDi6USB02ZDLesJ qnaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OmRAzxyR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f12si1041015eja.367.2020.08.20.05.17.22; Thu, 20 Aug 2020 05:17:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OmRAzxyR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730374AbgHTMQc (ORCPT + 99 others); Thu, 20 Aug 2020 08:16:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:40426 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730093AbgHTJ4v (ORCPT ); Thu, 20 Aug 2020 05:56:51 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 426E620855; Thu, 20 Aug 2020 09:56:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597917410; bh=v82VMAnIc4Uxb3auCZw26sAs6sE1Xz0aSxH4vCm1s5o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OmRAzxyRgibsOC9w5OyuT6ffhFKbnegvBZ1t4s5ixJvZAoKA1XQy4ETG0UtkhZo8D XQHHPN1cLnUWiESYITvkOYguZQIScsATMsHCOTcqMHDScCx4/g1rHhKvEtp603+k6s 7RuNIZo9nQBeZptrlaQCSH9VmvaLpS/Mj6MY/3fg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chris Mason , Rik van Riel , Dave Chinner , "Darrick J. Wong" , Samuel Mendoza-Jonas , Frank van der Linden , Suraj Jitindar Singh , Benjamin Herrenschmidt , Anchal Agarwal Subject: [PATCH 4.9 021/212] xfs: fix missed wakeup on l_flush_wait Date: Thu, 20 Aug 2020 11:19:54 +0200 Message-Id: <20200820091603.404319017@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200820091602.251285210@linuxfoundation.org> References: <20200820091602.251285210@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Rik van Riel commit cdea5459ce263fbc963657a7736762ae897a8ae6 upstream. The code in xlog_wait uses the spinlock to make adding the task to the wait queue, and setting the task state to UNINTERRUPTIBLE atomic with respect to the waker. Doing the wakeup after releasing the spinlock opens up the following race condition: Task 1 task 2 add task to wait queue wake up task set task state to UNINTERRUPTIBLE This issue was found through code inspection as a result of kworkers being observed stuck in UNINTERRUPTIBLE state with an empty wait queue. It is rare and largely unreproducable. Simply moving the spin_unlock to after the wake_up_all results in the waker not being able to see a task on the waitqueue before it has set its state to UNINTERRUPTIBLE. This bug dates back to the conversion of this code to generic waitqueue infrastructure from a counting semaphore back in 2008 which didn't place the wakeups consistently w.r.t. to the relevant spin locks. [dchinner: Also fix a similar issue in the shutdown path on xc_commit_wait. Update commit log with more details of the issue.] Fixes: d748c62367eb ("[XFS] Convert l_flushsema to a sv_t") Reported-by: Chris Mason Signed-off-by: Rik van Riel Signed-off-by: Dave Chinner Reviewed-by: Darrick J. Wong Signed-off-by: Darrick J. Wong Cc: stable@vger.kernel.org # 4.9.x-4.19.x [modified for contextual change near xlog_state_do_callback()] Signed-off-by: Samuel Mendoza-Jonas Reviewed-by: Frank van der Linden Reviewed-by: Suraj Jitindar Singh Reviewed-by: Benjamin Herrenschmidt Reviewed-by: Anchal Agarwal Signed-off-by: Greg Kroah-Hartman --- fs/xfs/xfs_log.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) --- a/fs/xfs/xfs_log.c +++ b/fs/xfs/xfs_log.c @@ -2634,7 +2634,6 @@ xlog_state_do_callback( int funcdidcallbacks; /* flag: function did callbacks */ int repeats; /* for issuing console warnings if * looping too many times */ - int wake = 0; spin_lock(&log->l_icloglock); first_iclog = iclog = log->l_iclog; @@ -2836,11 +2835,9 @@ xlog_state_do_callback( #endif if (log->l_iclog->ic_state & (XLOG_STATE_ACTIVE|XLOG_STATE_IOERROR)) - wake = 1; - spin_unlock(&log->l_icloglock); - - if (wake) wake_up_all(&log->l_flush_wait); + + spin_unlock(&log->l_icloglock); } @@ -4002,7 +3999,9 @@ xfs_log_force_umount( * item committed callback functions will do this again under lock to * avoid races. */ + spin_lock(&log->l_cilp->xc_push_lock); wake_up_all(&log->l_cilp->xc_commit_wait); + spin_unlock(&log->l_cilp->xc_push_lock); xlog_state_do_callback(log, XFS_LI_ABORTED, NULL); #ifdef XFSERRORDEBUG